A method for activating a device operatively coupled to an activation circuit includes steps of: receiving a password-protected instruction sent by wireless communication to the device; decoding the instruction using the password; and activating the activation circuit by permanently changing the state of the activation circuit from an off state to an on state.
|
1. A method of activating a device, the method comprising:
receiving an instruction encoded with a password from a wireless communication device embedded within the device, wherein the password is a mathematical function of a first product identifier and a second product identifier attached to the device;
decoding the instruction using the password; and
activating an activation circuit in the device by permanently changing the state of the activation circuit from an off state to an on state.
5. A machine-implemented method comprising:
scanning a first tag, the first tag being an rfid product label containing first identification information associated with an item at a point-of-sale terminal;
scanning a second tag, the second tag comprising a bar code containing second identification information associated with the item at a point-of sale terminal;
comparing the first identification information with the second identification information;
if the first and second identification information is consistent:
retrieving a password from a data store, wherein the password is a mathematical function of both the rfid product label and the bar code; and
transmitting the password to the item, with an activation command; and
issuing a warning that at least one of the tags is not authentic when the first and second identification information is inconsistent.
6. A machine-implemented method comprising:
scanning a first tag, the first tag being an rfid tag containing identification information associated with an item at a point-of-sale, wherein the identification information comprises a first product code;
scanning a second tag, the second tag comprising a bar code containing identification information associated with the item at a point-of sale, wherein the identification information comprises a second product code;
comparing the identification information contained by the first tag with the identification information contained by the second tag;
confirming a mutual authenticity of the identification information contained by the first and second product codes; and
sending an activation password by a wireless medium to an activation circuit contained within the item, wherein the password is a mathematical function of the first and second product codes.
2. The method of
3. The method of
8. The method of
|
The present invention relates to consumer electronics and more specifically to a system for activation of an electronic component at a point of sale terminal.
Radio-frequency identification (RFID) technology is being implemented at many large retail establishments at the case and pallet level. Pilot implementation of RFID tagging for individual items has started. It is likely that widespread item-level RFID tagging will follow. A significant problem for retailers has always been inventory shrinkage due to theft or loss of items, which can exceed one percent of total sales revenue. For large retailers, this shrinkage can translate into millions, and for some billions, of dollars. High shrinkage areas within the business include the areas of electronics devices, small home appliances, and multimedia (CD, electronic games, and DVD players). These are high value, high margin products, which are easily concealed, lending to a very high internal as well as external theft rate. Many factors play into high shrinkage, such as poor inventory management, poor hiring and training choices, as well as poor operational practices at the store level. These operational issues lead to excessive product turnover rates, poor customer services with stock outages, all leading to lost sales and lower margins. Depending on the inventory agreement between the retailer and supplier, the financial impact can apply to both. In the end, it is the honest consumer that pays for the incremental cost of inventory shrinkage.
There is a need for a solution to limit the theft or shrinkage of items. RFID tagging of the item level product may help if the RFID tags are used for both checkout and as anti-theft devices. If used as anti-theft RFID tagged items would be scanned at doorways. Tags for which an anti-theft bit had not been deactivated would trigger an alarm. However, RFID as an anti-theft technology may be defeated by various means including the use of metal shielding, or the removal, destruction, or substitution of the tags. Employees may also remove items through doorways that are not equipped with anti-theft scanners or readers. Traditional electric or magnetic ant-theft tags have the same deficiencies. Thus there is a need to employ an improved anti-theft method.
According to one embodiment of the invention, wireless activation technology is imbedded in an item by the supplier, and enabled by the retailer at the point of sale. This solution is applicable to products such as iPod and other MP3 devices, video game modules, electronic toys, cell phones, and portable DVD players, or any electric or electronic device.
It is the aim of this invention to provide a method for wireless activation technology, such that an electric or electronic device is activated only when a password for activation is supplied by wireless means at the point-of-sale.
It is further the aim of the invention to provide a means for generating a password that combines elements from different tagging means, e.g., RFID tags and barcodes to make decryption of the password more difficult.
It is also the aim of this invention to provide a method for the mutual authentication of labels applied to retail items.
As RFID becomes more popular suppliers will implement an RFID or other wireless sensor as part of their item level product. Once the items came into the store via case or pallet, the bulk items would be broken down into the item level.
Referring to
The computing system 110 is used to control a point-of-sale terminal (POS) 155, and a reader or communications device 150 for reading and communicating with a circuit containing a wireless activation device 109. The reader devices 109, or device reader, may communicate with the point-of-sale terminal 155 and computing system 110 by wired or wireless means such as WiFi, 801.11x, or Bluetooth.
The reader 150 and wireless activation device 109 may form a system that uses RFID for communications, or other wireless communications systems 175 such as Bluetooth, Zigbee, or WiFi. The electronics item 107 may be manufactured with the functioning of the power supply or other critical component such as the display screen or speakers are in a disabled state. The wireless activation device 109, e.g. RFID tag, or Bluetooth, Zigbee, WiFi communication devices, upon receipt of a password protected command may be used to initiate a switching circuit to enable an activation circuit to enable the working of the power supply or other circuit of the electronic item 107. The password-protected instruction conveyed by wireless communication 175 to the wireless activation device 109 may permanently change the state of an activation circuit from off to on. Thus, the electronics item may be enabled at a Point of Sale 155. Additionally, the point-of-sale or local computing system may be used to store and manage the passwords used to enable the activation device. The wireless activation device may be an RFID circuit which also contains product information, e.g. an EPCglobal electronic product code. The product information may be recorded at the same time that the activation is accomplished.
Retailers will be able to identify the need for a specific product on the shelf. The system makes the needed recommendations of the correct number of units to be placed on the shelf. This number is derived on sell through information gained from the stores sales processors. As each product is tracked through the register the RFID tag may be scanned or read at the point of sale and the sales data is then moved into the store's order database triggering a re-order process.
Unlike previous wireless locking and unlocking systems, in one embodiment of this system 100 the activation may be performed once and is permanent. In a preferred embodiment, shrinkage, or theft, may be reduced by the inclusion of a wireless device 109 to enable the working of a consumer electronic item 107, such as small home appliances, multimedia, CD, electronic game, electric razor, DVD players, stereo, MP3 player, computer, PDA, and TV. The electronic item 107 may be manufactured with the functioning of the power supply or other critical component such as the display screen or speakers in a disabled state. The wireless device 109, e.g. RFID tag, Bluetooth, Zigbee, WiFi, and the like, upon receipt of a pass-word protected command is used to initiate a switching circuit to enable the working of the power supply of the electronic item 107. The electronic item 107 may be enabled at the Point of Sale 155.
Thus, the scanning operation may be used to determine the authenticity of the bar code number and the RFID tag number. These numbers may be compared in the computing system to determine whether the numbers are consistent, e.g. that at least one of the tags has not been switched with another one.
Embodiments of the invention can be implemented in digital electronic circuitry, or in computer hardware, firmware, software, or in combinations of them. Embodiments of the invention can be implemented as a computer program product, i.e., a computer program tangibly embodied in an information carrier, e.g., in a machine readable storage device or in a propagated signal, for execution by, or to control the operation of, data processing apparatus, e.g., a programmable processor, a computer, or multiple computers. A computer program can be written in any form of programming language, including compiled or interpreted languages, and it can be deployed in any form, including as a stand alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment. A computer program can be deployed to be executed on one computer or on multiple computers at one site or distributed across multiple sites and interconnected by a communication network.
Method steps of embodiments of the invention can be performed by one or more programmable processors 120 executing a computer program to perform functions of the invention by operating on input data and generating output. Method steps can also be performed by, and apparatus of the invention can be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application specific integrated circuit).
Referring to
Referring to
The method then comprises a step 420 of receiving a password-protected instruction by a wireless communication device embedded within an electronic device. In step 440 the system decodes the password-protected instruction. In step 460 the system activates an activation circuit in the electronic device by permanently changing the state of the activation circuit from an off state to an on state.
Processors 120 suitable for the execution of a computer program include, by way of example, both general and special purpose microprocessors, and any one or more processors of any kind of digital computer. Generally, a processor 120 will receive instructions and data from a read only memory (not shown) or a random access memory 115 or both. The essential elements of a computer are a processor 120 for executing instructions and one or more memory devices for storing instructions and data. Generally, a computer 110 will also include, or be operatively coupled to receive data from or transfer data to, or both, one or more mass storage devices 125 for storing data, e.g., magnetic, magneto optical disks, or optical disks. Information carriers suitable for embodying computer program instructions and data include all forms of non volatile memory, including by way of example semiconductor memory devices, e.g., EPROM, EEPROM, and flash memory devices; magnetic disks, e.g., internal hard disks or removable disks; magneto optical disks; and CD ROM and DVD-ROM disks. The processor 120 and the memory can be supplemented by, or incorporated in special purpose logic circuitry.
It is to be understood that the foregoing description is intended to illustrate and not to limit the scope of the invention, which is defined by the scope of the appended claims. Other embodiments are within the scope of the following claims.
Moskowitz, Paul A., Hild, Stefan G., Lindsey, Paul D., Nilsen, Eric J., Bowers, Richard G.
Patent | Priority | Assignee | Title |
10700868, | Mar 19 2018 | Security systems and methods for electronic devices | |
10904600, | May 30 2017 | Saturn Licensing LLC | Activating audio video device (AVD) functionality after point of sale |
11288662, | Mar 19 2018 | Security systems and methods for electronic devices | |
7933594, | Jun 18 2003 | Fisher-Rosemount Systems, Inc. | Self-configuring communication networks for use with process control systems |
8123118, | Jul 02 2003 | United States Postal Service | System and method for tracking shipment of items utilizing RFID-tags |
8144622, | Jun 17 2005 | Fisher-Rosemount Systems, Inc | Wireless architecture and support for process control systems |
8160574, | Jun 17 2005 | Fisher-Rosemount Systems, Inc. | Wireless architecture utilizing geo-referencing |
8436638, | Dec 10 2010 | International Business Machines Corporation | Switch to perform non-destructive and secure disablement of IC functionality utilizing MEMS and method thereof |
8478195, | Feb 17 2012 | GOOGLE LLC | Two-factor user authentication using near field communication |
8478196, | Feb 17 2012 | GOOGLE LLC | Two-factor user authentication using near field communication |
8579186, | Jul 02 2003 | United States Postal Service | System and method for tracking shipment of items utilizing RFID-tags |
9002270, | Feb 17 2012 | GOOGLE LLC | Two-factor user authentication using near field communication |
9231660, | Feb 17 2012 | GOOGLE LLC | User authentication using near field communication |
9264973, | Jun 17 2005 | Fisher-Rosemount Systems, Inc. | Wireless architecture and support for process control systems |
9992726, | Jun 17 2005 | Fisher-Rosemount Systems, Inc. | Wireless architecture and support for process control systems |
Patent | Priority | Assignee | Title |
6592038, | Apr 09 2001 | NCR Voyix Corporation | Item processing system and method which track label usage |
20050178832, | |||
20050273434, | |||
20060095385, | |||
20060187042, | |||
20060273910, | |||
20070188306, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Apr 28 2006 | LINDSEY, PAUL D | International Business Machines Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 017920 | /0164 | |
Apr 28 2006 | MOSKOWITZ, PAUL A | International Business Machines Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 017920 | /0164 | |
Apr 30 2006 | NILSEN, ERIC J | International Business Machines Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 017920 | /0164 | |
May 01 2006 | International Business Machines Corporation | (assignment on the face of the patent) | / | |||
May 01 2006 | BOWERS, RICHARD G | International Business Machines Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 017920 | /0164 | |
May 01 2006 | HILD, STEFAN G | International Business Machines Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 017920 | /0164 |
Date | Maintenance Fee Events |
Sep 10 2012 | REM: Maintenance Fee Reminder Mailed. |
Jan 17 2013 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Jan 17 2013 | M1554: Surcharge for Late Payment, Large Entity. |
Sep 09 2016 | REM: Maintenance Fee Reminder Mailed. |
Jan 27 2017 | EXP: Patent Expired for Failure to Pay Maintenance Fees. |
Date | Maintenance Schedule |
Jan 27 2012 | 4 years fee payment window open |
Jul 27 2012 | 6 months grace period start (w surcharge) |
Jan 27 2013 | patent expiry (for year 4) |
Jan 27 2015 | 2 years to revive unintentionally abandoned end. (for year 4) |
Jan 27 2016 | 8 years fee payment window open |
Jul 27 2016 | 6 months grace period start (w surcharge) |
Jan 27 2017 | patent expiry (for year 8) |
Jan 27 2019 | 2 years to revive unintentionally abandoned end. (for year 8) |
Jan 27 2020 | 12 years fee payment window open |
Jul 27 2020 | 6 months grace period start (w surcharge) |
Jan 27 2021 | patent expiry (for year 12) |
Jan 27 2023 | 2 years to revive unintentionally abandoned end. (for year 12) |